The primary purpose of humanoid telepresence cyber-physical systems is to faithfully reproduce user intent in the remote robot. One of the main challenges lies in maintaining bipedal balance during complex behaviour s...
详细信息
ISBN:
(纸本)1902956850
The primary purpose of humanoid telepresence cyber-physical systems is to faithfully reproduce user intent in the remote robot. One of the main challenges lies in maintaining bipedal balance during complex behaviour such as walking, or negotiating obstacles whilst operating in a changing environment. The aim is to achieve this dynamic balance during human-controlled motion, and determine an effective solution to the humanoid telepresence problem by using a distributed sensing and actuation architecture. Preliminary results are presented for the stability of a Kondo KHR-1HV robot equipped with wireless motion capture Orient-2 sensors (each equipped with 3-axes gyroscope, magnetometer and accelerometer) for controlling six servos in the joints in the upper and lower legs and connected as a mesh, which demonstrate that distributed robotic control is better able to recover gracefully from command latency and local failures.
Clouding computing is considered as one of the most promising computing paradigms. Most already existing systems, which provide cloud computing, only pay attention to aggregating resources with the same computing capa...
详细信息
Clouding computing is considered as one of the most promising computing paradigms. Most already existing systems, which provide cloud computing, only pay attention to aggregating resources with the same computing capability and provide user with local optimized and discontinuous results. To satisfy users' complex requirements it's necessary to orchestrate resources with different functions together and produce the personalized resource flow to users. In this paper, we offer an approach for the issues. We build a semantic layer for cloud computing to connect resources from different domains. Our approach relies on the semantic representation and relationship of resources. The Similarity Link Network (SLN) and Association Link Network (ALN) based on the similarity and association relation respectively, form SLN-cloud and ALN-cloud which makes the clouds with rich abilities possible. Accurate and continuous results can be provided to users depending on the global view of resources.
Novel Musical Applications and Design Techniques for the Gametrak tethered spatial positioning controller are described. Individual musical instrument controllers and large-scale musical and multimedia applications ar...
详细信息
ISBN:
(纸本)9789899557765
Novel Musical Applications and Design Techniques for the Gametrak tethered spatial positioning controller are described. Individual musical instrument controllers and large-scale musical and multimedia applications are discussed.
As the use of personal information in social network sites seems manifold, including the representation of an individual's digital persona (or social role) and identification, so does the abuse or misuse of the in...
详细信息
As the use of personal information in social network sites seems manifold, including the representation of an individual's digital persona (or social role) and identification, so does the abuse or misuse of the information. The issue of privacy is critically important in this context. In this paper we present a novel framework for enabling user-controlled sharing of sensitive personal information for better privacy protection in current online social networks. Specifically, the framework called U-Control is proposed to facilitate digital persona and privacy management (DPPM) in a user-centric way that it can satisfy diverse privacy requirements and specification, and social network environments. We discuss the design of a security system based on the proposed framework. Finally we discuss a proof-of-concept implementation, along with performance evaluation.
We propose in this paper a general framework for an integrated End-to-End Testing of IT Architecture and Applications using the simultaneous application of combinatorial testing and virtualization. Combinatorial testi...
详细信息
We propose in this paper a general framework for an integrated End-to-End Testing of IT Architecture and Applications using the simultaneous application of combinatorial testing and virtualization. Combinatorial testing methods are often applied in cases of the configuration testing. The combinatorial approach to software testing uses models, particularly an Orthogonal Array Testing Strategy (OATS) is proposed as a systematic, statistical way of testing pair-wise interactions to generate a minimal number of test inputs so that selected combinations of input values are covered. Virtualization, in the process of testing, is based on setting the necessary environment to multiple virtual machines, which run on one or in smaller groups of physical computers, which are: reduce the cost of equipment and related resources, reduce the time required to manage the testing process, and favors raising removal of test infrastructure. Together, combinatorial testing and virtualization presents practical approach to improving process of testing, through the balancing quality, cost and time.
This paper deals with colour image authentication technique using a high capacity watermarking algorithm. The watermark is embedded into the green channel of the host image by modifying the very low frequency coeffici...
详细信息
This paper deals with colour image authentication technique using a high capacity watermarking algorithm. The watermark is embedded into the green channel of the host image by modifying the very low frequency coefficients of the DCT transformation. The new algorithm can embed watermarking information in up to 25% of the host image size. The new technique can resist classical attacks such as JPEG compression, low pass filtering, median filtering, cropping, and scaling attacks. Moreover, the recovery method is blind since it does not need the original host image for extraction.
Systems manipulating large number of courses and students are called learning management systems (LMS). LMS have excellent performances implemented through advanced Web technologies but often poor or rarely used repos...
详细信息
Systems manipulating large number of courses and students are called learning management systems (LMS). LMS have excellent performances implemented through advanced Web technologies but often poor or rarely used repository for storing institution's educational data. There still remains a problem of how to allow users of LMS to easily modify and integrate content form federated e-learning repositories into their courses. In this article we present analysis of present repository frameworks and projects. Also, we present possibilities of using FEDORA (Flexible Extensible Digital Repository Object Architecture) framework as a repository solution. A pilot application has been created for demonstration of interaction between LMS and repository.
This work focuses on proposing a method of effectively dealing with P2P-based service selection and composition, especially when handling a large number of peers along with their diverse qualities. The QoS-aware peer ...
详细信息
This work focuses on proposing a method of effectively dealing with P2P-based service selection and composition, especially when handling a large number of peers along with their diverse qualities. The QoS-aware peer selection is one of the major challenges faced in order to guarantee the success and enhance performance of distributed computing. Since many peer candidates provide overlapping or identical functionalities, though with different QoS evaluations, selections need to be rapidly conducted to determine which peers are suitable to join in the requested composite service. The main contribution of this paper is proposing a P2P-based service selection model, in which peer's non-functional properties are modeled with Web service modelling ontology (WSMO), and where ant colony optimisation (ACO) technique is adopted to facilitate and enhance the QoS-aware peers' composition. We present experimental results to illustrate the effectiveness and feasibility of the proposed method.
This paper proposes a "soft systems" approach to domain-driven design of computer-based information systems. We propose a systemic framework combining techniques from Soft Systems Methodology (SSM), the Unif...
详细信息
This paper proposes a "soft systems" approach to domain-driven design of computer-based information systems. We propose a systemic framework combining techniques from Soft Systems Methodology (SSM), the Unified Modelling Language (UML), and an implementation pattern known as "Naked Objects". We have used this framework in action research projects that have involved the investigation and modelling of business processes using object-oriented domain models and the implementation of software systems based on those domain models. Within the proposed framework, Soft Systems Methodology (SSM) is used as a guiding methodology to explore the problem situation and to generate a ubiquitous language (soft language) which can be used as the basis for developing an object-oriented domain model. The domain model is further developed using techniques based on the UML and is implemented in software following the "Naked Objects" implementation pattern. We argue that there are advantages from combining and using techniques from different methodologies in this way. The proposed systemic framework is overviewed and justified as multimethodologyusing Mingers multimethodology ideas. This multimethodology approach is being evaluated through a series of action research projects based on real-world case studies. A Peer-Tutoring case study is presented here as a sample of the framework evaluation process.
This paper investigates the use of clouds and autonomic cloudbursting to support a medical image registration. The goal is to enable a virtual computational cloud that integrates local computational environments and p...
详细信息
暂无评论